Seminar REPORT .
Seminar REPORT .
Chapter 1.
Introduction
Now is the era of connected objects. IoT (Internet of Things) is gaining much importance
in almost every field such as business, industry, consumer electronics, automotive and much more.
Every object in today’s world is well connected to each other in one way or the other. We can control
the lights and equipment in our homes sitting in our office. In industries and other fields activities are
regulated and controlled from a remote location. Controlling street lights from a remote distance, smart
food order system, etc., is no longer a dream. Gone are the days where the presence of the person on the
spot was necessary for the monitoring and control. Technology has advanced to an extend where
everything can be made possible sitting in your house or in your office cubicle. IoT plays a major role in
this. IoT connects various objects such as sensors, actuators, electronics and network connectivity that
enable the objects to exchange data between them and stay connected. It is a network of physical
objects. According to Machina Research, connected objects will account for more than 25 billion
connections by 2025 [3]. At present 16 billion objects are connected by IoT with industries, smart cities
and smart homes contributing the highest number. A large number of objects are connected by
technologies such as GSM, ZigBee, Wi-Fi, and Bluetooth. But in all these power requirement and
battery life is a major issue. Most of the applications in today’s world are embedded systems. These
systems have very high power constrains as most of this system are battery operated and not externally
powered.
LoRa (Long Range) is a new wireless IoT connectivity family that has recently evolved and
is gaining popularity in low powered battery operated embedded systems that need to transfer small
amount of data at short intervals over long range [1].
1|Page
LoRaWAN NETWORK TECHNOLOGY
Chapter 2.
2|Page
LoRaWAN NETWORK TECHNOLOGY
the security is low. Anybody can interfere with the data during transmission. It was a very poor
encryption and cannot be regarded as secure. On the other hand, the LoRa offers double AES encryption.
The security of LoRa is very high. The LoRa is based on chirp spread spectrum (CSS) which is highly
resistant to multipath and fading.
3|Page
LoRaWAN NETWORK TECHNOLOGY
4|Page
LoRaWAN NETWORK TECHNOLOGY
Chapter 3
Literature Review
5|Page
LoRaWAN NETWORK TECHNOLOGY
6|Page
LoRaWAN NETWORK TECHNOLOGY
7|Page
LoRaWAN NETWORK TECHNOLOGY
Chapter 4
8|Page
LoRaWAN NETWORK TECHNOLOGY
LoRa is a physical layer that provides a long-range communication link. This has been
standardized and extended by adding a MAC layer LoRaWAN (Long Range Wide Area Network) to it.
This defines the network architecture and communication protocol. LoRaWAN specification is
standardized and open sourced by the LoRa alliance. Most of the existing technologies are based on
mesh network. In the mesh network the infrastructure node is LoRa is a physical layer that provides a
long-range communication link. This has been standardized and extended by adding a MAC layer
LoRaWAN (Long Range Wide Area Network) to it. This defines the network architecture and
communication protocol. LoRaWAN specification is standardized and open sourced by the LoRa
alliance. Most of the existing technologies are based on mesh network. In the mesh network the
infrastructure node isconnected to as many nodes as possible and cooperates with one another to route
the data. In the mesh network each node receives and forward data from other node that might be
irrelevant for it. This increases the range to a great deal but also adds complexity and decreases the
battery life. On the other hand, in the star topology the bridge or switches are directly connected to a
small subset of bridge or switches deceasing complexity of the network. These provide a hierarchical
infrastructure. LoRaWAN is based on star topology. They decrease the power consumption and battery
life to a great extend in comparison with the conventional mesh network.
A. The LoRa Node or End Points - The end points or LoRa nodes comprises sensors or application
where sensing and control takes place such as sensors, tracking devices, etc., [1] [4]. This is the heart of
an embedded system. These include water meter, smoke alarm, gas monitoring and such applications.
B. The Gateway -The gateway comprises the net element of the LoRa network. There are a number of
gateways [1] [4]. Each gateway is connected to every end node. The data transmitted by the node is sent
to all the gateways and each gateway which receives a signal transmits it to a cloud based network server
via cellular, Ethernet, satellite, or Wi-Fi. The gateway can be micro gateway or pico gateway. Micro
gateways are used in public network to give city or nationwide coverage while the Pico gateway is used
in hard to reach dense areas to improve the quality of service and network capacity. Micro gateway gives
high coverage. Both Omni-directional and multi-sector antennas are used in LoRa base station.
C. The Network Server - The network server has all the intelligence. The data received from different
9|Page
LoRaWAN NETWORK TECHNOLOGY
gateways is filtered, security checks, adaptive data rates etc., are performed and acknowledgement is sent
to the gateways [1] [4]. The network server is the one who identifies whether the data received is intended
for any application server and is thus sent to the intended application server via some backhaul.
D. The Application Server - They receive the intended data from the network server.
Chapter 5.
LoRa FEATURES
A. Long Range of Lora - As the name implies LoRa is a long-range protocol. It is capable of
transmitting data over long distances. A single gateway can cover hundred-kilometer square of area. The
long range of the LoRa technology is due to its link budget and the chirp spread spectrum modulation
that it employs.
1) Chirp spread spectrum: LoRa employs chirp spread spectrum modulation technique. This technique is
being used in military and space communication for over decades due to its robust nature and long-range
capacity. It is now being used commercially in LoRa communication. It also provides immunity to
multipath and fading. The chirp spread spectrum has a low transmission power requirement. Chirp is a
signal whose frequency increases or decreases over time. Thus, a chirp signal can be up-chirp and down-
chip. In the chirp spread spectrum modulation the wanted data signal is multiplied with the chirp signal
[2]. This spreads the bandwidth beyond the bandwidth of the original data signal. At the receiver end the
received signal is re-multiplies with the locally generated copy of the chirp signal. this compresses the
modulated signal back to the original bandwidth. This reduces the noise and interference. The LoRa
modulation bit rate can be expressed as Rb = SF * bit/sec (1) Rb: Bit Rate SF: Spreading Factor BW:
Bandwidth The increase in the signal bandwidth gives the error free data that is transmitted over long
distance. This can be visualized by comparing the sensitivity of the LoRa modulated signal to the
frequency shift key modulated signal. The sensitivity of the chirp spread spectrum modulated signal is
much higher than that of frequency shift key modulation.
2) Link Budget: The LoRa technology has a link budget greater than any other existing technologies.
Link budget accounts for its long range to a great extent. Link budget is an accounting of all the gains
and losses in a transmission system. The link budget of a network can be expressed as PRX(dBm) =
PTX(dBm) + GSYSTEM(dB) - LSYSTEM(dB) - LCHANNEL(dB) - M(dB) (2) where, PRX(dBm):
received power PTX(dBm): transmitted power GSYSTEM(dB): system gains such as those associated
with directional antennas, etc. LSYSTEM: losses associated with the system such as feed-lines, antennas
etc. LCHANNEL: losses due to the propagation channel M: fading margin The link budget is the power
that is received at the receiver side. The link budget of LoRa is high that in turn accounts for its high
sensitivity. Most of the technologies used for connectivity in IoT uses frequency shift key (FSK)
modulation. When the data rate of LoRa signal is equivalent to four times the data rate of the frequency
shift key (FSK) signal the LoRa signal offers the similar or equal sensitivity. Thus, LoRa can cover more
distance than any other technique.
B. Battery lifetime - The most important criteria of an embedded device is its battery lifetime. Most of
the embedded devices need to communicate with other devices near or far. This consumes high power.
The embedded devices are all mostly battery operated. Thus, the essential requirement of these
10 | P a g e
LoRaWAN NETWORK TECHNOLOGY
embedded devices is its battery lifetime. Most of the protocols or techniques used to create IoT
embedded device now-a-days consumes very high power thus reducing the battery lifetime. LoRa
optimizes the battery consumption in a device and is most suited for battery operated embedded device.
LoRa consumes the least power when compared to all the existing technologies. The low battery
consumption in a LoRa networks accounts to the asynchronous communication of the nodes in the
network. In a LoRa network the nodes communicates only when they have any data to send whether
energy driven or scheduled. They adopt the ALOHA method. In ALOHA method frame is send only
when there is any data to send otherwise no transmission takes place. If the frame is received
successfully another frame is sent or the same frame is retransmitted. The ALOHA method saves battery
lifetime because the network is doing transmission when there is any data. It does not do any
transmission otherwise. Also, most of the other technologies are of mesh network or adopt synchronous
communication in which the nodes have to wake up and synchronize time to time. This consumes more
energy. In a recent study it was shown that the LoRa technology is 4 to 5 times better than any other
existing technology.
C. Network Capacity - Star network is used in Lora network. The LoRa network gateway receives data
from large number of nodes. For this the gateway must have high capacity. This is achieved by adaptive
data rate and multichannel multi-modem transceiver at the gateway. Adaptive Data Rate (ADR) is a
mechanism for optimizing data rates, airtime and energy consumption in the network. Static nodes use
ADR (Adaptive Data Rate)[6]. Whether to use ADR or not is decided by the node itself. In ADR the
data rates of the node are managed by the network. When the node decides that it wants to use ADR it
sets the ADR bit to 1 in the uplink transmission. When the network gets the signal that the node wants to
use ADR it collects the signal to noise ratio, data rate, number of gateways that receive the data and
signal strength of the 20-recent transmission from the specific node. Based on this data the network
decides how much it can increase the data rate of decrease the transmission power. This reduces the air
time and optimizes the transmission power. We can also say that it helps in reduction of battery
consumption. This whole thing is done using the ADR algorithm. A node that is static at one time and
mobile at another. So, the ADR algorithm can also be used by a mobile node that is parked at a fixed
spot at the given time [13]. The multichannel multi-modem transceiver enables messages to be
simultaneously received from multiple gateways.
D. Security - AES encryption and IEEE 802.15.4/2006 Annex B is used in this technology for security
and authentication. While most technologies incorporate single layer security, LoRa network incorporate
two layers of security: network security and application security. The network security is used for
authenticating the node in the network while the application security protects the end user application
data from the network operator. The LoRa technology uses two keys for the security and authenticity:
NwkSKey (Network Session Key) and AppSKey (Application Session Key). For the end device to
participate in a network it must be activated and authenticated. The technology has two methods of
authentication and activation 1. Over the air activation (OAA) 2. Activation by personalisation (ABP) 1)
Over the air activation (OAA):In this type of end device activation, the device is not personalized with
any information. A join procedure is done for the end device to join any network. Before joining the
network, the end device is loaded with the information. This then has to be repeated for every
11 | P a g e
LoRaWAN NETWORK TECHNOLOGY
transmission over the network when the session context information is lost. This method ensures that the
end devices is not confined to any particular service provider and can join any network service provider
while in roaming. 2) Activation by personalization (ABP):In this type of activation, the end device will
be already stored with the information needed for the activation. The device directly joins the specific
network defined in the information when the device is started. This type of personalization is not used
frequently and is used only under some specific cases. The commonly used personalization method is
the Over the Air Activation method. In ABP method simply a join request and join accept message is
sent between the end device and the network for the end device to activate. NetSKey and AppSKey must
be specific to every end device. Apart from being an activation method both the methods also provide
authenticity and security over the network.
E. Quality of Service ( QoS ) - Quality of service is the account of overall performance of a network. It
is based on various parameters such as data rate, immunity, throughput, packet loss, etc. The LoRa
technology which is based on chirp spread spectrum technology offers fairly good quality of service. It
is immune to interference, multipath and fading. In a wireless network, as the distance between the
devices increases the signal strength decreases. These are usually avoided by installing repeaters or by
having additional nodes as in mesh topology. But the cost of having more repeaters or nodes in between
is very high. But for LoRa, those signal with different sequence will be treated as noise at the network
coordinator. The nodes near the coordinator can transmit at a higher data rate and ones far away from the
coordinator can reduce the bandwidth.
12 | P a g e
LoRaWAN NETWORK TECHNOLOGY
Chapter 6.
Limitations
LoRa like every technology has its own limitation too.
The limitations of LoRa are listed below:
Only those applications that require low data rate (upto 27 Kbps) can use this.
Limitations with the Duty Cycles in LoRa networks effectively limits the number of "messages" that
can be sent during a specific time frame.
It is not suited for real time applications that require lower latency.
13 | P a g e
LoRaWAN NETWORK TECHNOLOGY
Chapter 7.
Applications
14 | P a g e
LoRaWAN NETWORK TECHNOLOGY
Chapter 8.
Conclusion
LoRa or LPWA is a very recent technology that has been evolved. In 2013 or before that, the term did not
even exist. Now the technology has developed and is being promoted and used worldwide because of its
various technical advantages. This technology compliments various other technologies such as cellular
network. As recently as in 2013 nobody thought that such a technology would exist. The LoRa
technology is preferred due to various advantages such as the battery lifetime, the long range, the security,
robustness to interferences and more. The technology is a package in itself. Various applications differ
from each other in its requirement and capabilities. Every application thus, cannot use the same
technology. The technology that an application uses depends on its requirement and other factors. And so
LoRa as such cannot serve every application out there. But it is a preferred and most suited technology for
the IoT applications that need to communicate a long distance and in which the battery lifetime and power
consumption is a major limitation. LoRa technology also offers high security. It is expected that by 2024
3.6 billion LPWA connections will be established.
15 | P a g e
LoRaWAN NETWORK TECHNOLOGY
Chapter 9.
References
16 | P a g e
LoRaWAN NETWORK TECHNOLOGY
17 | P a g e